TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. Upstream patch: https://github.com/CendioOssman/tigervnc/commit/05e28490873a861379c943bf616614b78b558b89 References: https://github.com/TigerVNC/tigervnc/releases/tag/v1.10.1 https://www.openwall.com/lists/oss-security/2019/12/20/2
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1497 https://access.redhat.com/errata/RHSA-2020:1497
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-15695
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3875 https://access.redhat.com/errata/RHSA-2020:3875